An On-line Wireless Attack Detection System Using Multi-layer Data Fusion.pdf (297.86 kB)Download file
An on-line wireless attack detection system using multi-layer data fusion
conference contributionposted on 2012-03-12, 12:54 authored by Francisco J. Aparicio-Navarro, Kostas KyriakopoulosKostas Kyriakopoulos, David J. Parish
Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status of a network is rarely accurately detectable by examining only one network layer. This paper describes a synergistic approach of fusing decisions of whether an attack takes place by using multiple measurements from different layers of wireless communication networks. The described method is implemented on a live system that monitors a wireless network in real time and gives an indication of whether a malicious frame exists or not. This is achieved by analysing specific metrics and comparing them against historical data. The proposed system assigns for each metric a belief of whether an attack takes place or not. The beliefs from different metrics are fused with the Dempster-Shafer technique with the ultimate goal of limiting false alarms by combining beliefs from various network layers. The on-line experimental results show that cross-layer techniques and data fusion perform more efficiently compared to conventional methods.
- Mechanical, Electrical and Manufacturing Engineering
CitationAPARICIO-NAVARRO, F. ... et al., 2011. An on-line wireless attack detection system using multi-layer data fusion. IEEE International Workshop on Measurements & Networking (M&N 2011) Proceedings.
- SMUR (Submitted Manuscript Under Review)
NotesThis paper was presented at the Measurements and Networking Proceedings (M&N), 2011 IEEE International Workshop 10-11 October 2011 [© IEEE] and is also available at: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6088478 Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.